Privacy-Preserving Linear Region Search Service

被引:7
|
作者
Zhang, Hua [1 ]
Guo, Ziqing [1 ]
Zhao, Shaohua [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
Cryptography; Indexes; Cloud computing; Algorithm design and analysis; Search problems; Outsourcing; Linear region search; privacy-preserving; location-based services; data outsourcing; cloud computing; RANGE QUERIES; CLOUD; SECURE;
D O I
10.1109/TSC.2017.2777970
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to a variety of advantages of data outsourcing, some Location Based Services (LBS) providers are motivated to outsource the geographic data and query service to commercial cloud. However, for protecting data confidentiality, the valuable data should be encrypted before outsourcing, which obstructs the utilization like geographic information query. To address this problem, some previous works regarding to secure search on encrypted database could be applied in outsourced LBS scenario directly, but none of them is tailor-made for linear region search (LRS). The LRS is a kind of LBS that widely used in navigation system, it finds the nearby points of interest (POI) for a query segment. In this paper, for the first time, we explore and solve the challenging problem of privacy-preserving linear region search. Specifically, we choose the quadtree structure to build index for POI database, then the results of LRS can be efficiently obtained by finding out the rectangular regions that query segment passes through. In order to preserve the privacy of both LBS providers and users, according to computational geometry and Asymmetric Scalar-product Preserving Encryption (ASPE) approach, we design a novel algorithm for accurately determining whether a segment intersects with a rectangle on ciphertext. Moreover, this algorithm also provides a new idea to solve other computational problems in encrypted 2-dimensional geometry space. Based on different privacy requirements of two threat models, we propose two privacy-preserving LRS schemes and corresponding dynamic update operations. Security analysis and experiments on real-world dataset show that our schemes are secure and efficient.
引用
收藏
页码:207 / 221
页数:15
相关论文
共 50 条
  • [1] Privacy-preserving Range Search
    Liu, Jie
    Chen, Changpin
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 553 - 556
  • [2] Privacy-Preserving PayString Service
    de Cristo, Flaviene Scheidt
    Shbair, Wazen M.
    Trestioreanu, Lucian
    Malhotra, Aanchal
    State, Radu
    2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2021,
  • [3] Privacy-preserving linear programming
    O. L. Mangasarian
    Optimization Letters, 2011, 5 : 165 - 172
  • [4] Privacy-preserving linear programming
    Mangasarian, O. L.
    OPTIMIZATION LETTERS, 2011, 5 (01) : 165 - 172
  • [5] PrigSim: Towards Privacy-Preserving Graph Similarity Search as a Cloud Service
    Wang, Songlei
    Zheng, Yifeng
    Jia, Xiaohua
    Huang, Hejiao
    Wang, Cong
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (10) : 10478 - 10496
  • [6] Search Me If You Can: Privacy-preserving Location Query Service
    Li, Xiang-Yang
    Jung, Taeho
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2760 - 2768
  • [7] Privacy-Preserving Outsourced Media Search
    Weng, Li
    Amsaleg, Laurent
    Furon, Teddy
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (10) : 2738 - 2751
  • [8] Privacy-Preserving Outsourced Similarity Search
    Kozak, Stepan
    Novak, David
    Zezula, Pavel
    JOURNAL OF DATABASE MANAGEMENT, 2014, 25 (03) : 48 - 71
  • [9] Privacy-Preserving Text Mining as a Service
    Costantino, Gianpiero
    La Marra, Antonio
    Martinelli, Fabio
    Saracino, Andrea
    Sheikhalishahi, Mina
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 890 - 897
  • [10] Trustworthy Privacy-Preserving Service Compositions
    Theuermann, Kevin
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 10 - 17